Undissolvable Problems: things that still confuse me
lesswrong.com·21h
Category Theory
Flag this post
A Practical Guide to Transitioning to Memory-Safe Languages
queue.acm.org·6h·
🛡️Memory Safety
Flag this post
The Transformer and the Hash: building blocks of 21st century political science
nothinghuman.substack.com·9h·
Discuss: Substack
🔒Digital Privacy
Flag this post
How the PolyBlocks AI Compiler Works
docs.polymagelabs.com·3h·
Discuss: Hacker News
🌐SIMD.js
Flag this post
Making .NET Serialization Gadgets by Hand
vulncheck.com·16h·
Discuss: Hacker News
📦Binary Formats
Flag this post
BUILDING A BIGRAM LANGUAGE MODEL
dev.to·2h·
Discuss: DEV
📝Parsing
Flag this post
Building SqURL: A Human's and an AI's Perspective
ronforrester.substack.com·21h·
Discuss: Substack
📦Folly
Flag this post
Introduction to FPGA and Verification of FPGA-based designs
future.forem.com·1d·
Discuss: DEV
Hardware Acceleration
Flag this post
Selective (smart) MoE experts offloading to CPU?
arxiv.org·1d·
Discuss: r/LocalLLaMA
📱Edge AI
Flag this post
Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend
dev.to·1d·
Discuss: DEV
🔐Cryptography
Flag this post
How Orbs Is Turning Base Network DEXs Into Perpetual Futures Powerhouses
hackernoon.com·1d
🌐Axum
Flag this post
Instant Parameter Selection for Modular Systems (b, p, t, r)
news.ycombinator.com·22h·
Discuss: Hacker News
📐TLA+
Flag this post
Symbol Detection in Multi-channel Multi-tag Ambient Backscatter Communication Under IQ Imbalance
arxiv.org·1d
📊Information Theory
Flag this post
Explorations of RDMA in LLM Systems
le.qun.ch·2d·
Discuss: Hacker News
RDMA
Flag this post
I Failed, Failed, and Succeeded at Learning How to Code (2011)
theatlantic.com·5h·
Discuss: Hacker News
💾Retro Computing
Flag this post
Reverse Engineering Yaesu FT-70D Firmware Encryption
landaire.net·7h·
Discuss: Hacker News
🔓Binary Exploitation
Flag this post
A catalog of side effects
bernsteinbear.com·2d·
🦀Rust Macros
Flag this post
Computability of the Optimizer for Rate Distortion Functions
arxiv.org·9h
📊Information Theory
Flag this post
Optimizing RocksDB in TiKV (Part 1) – The Battle Against the DB Mutex
medium.com·10h·
Discuss: Hacker News
📋Columnar Storage
Flag this post
Diving into Rama: A Clojure LSH Vector Search Experiment
shtanglitza.ai·5d·
Discuss: Hacker News
🧮Vector Databases
Flag this post